Assignment

This paper is needed within 6 hours 

Scope

Writer must be experienced in c programming

Must be answered within the time stated(6 hours)

Check the attached

Organization and Leadership

Question:

Provide an example from the last two years of unethical leadership and explain why the leadership was unethical. Describe what ethical leadership would have done in the situation. Provide links to additional information about this unethical leadership event.

  • Your answer must be substantive, which usually requires 300 or more words
  • Your answer must be well written and well organized
  • Your answer must include one properly formatted APA in-text citation to a scholarly reference other than the assigned course reading. The full reference must be provided at the end of your answer with a link if one is available.

Task

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own careers. 

Assignment: Provide a reflection of at least 500 words (or 2 pages double-spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study

Network Security

 Your home network is vulnerable to network attacks by hackers. There is a  concept in network security called defense-in-depth (as known as a  layered security approach). Consider a layered security approach  starting from the router to your devices in your discussion response.  

 

In your original post, answer the following:

  • What are the threats that you need to be concerned about on your home network?
  • What are the vulnerabilities for each of your devices on your home network?
  • What are some techniques you can use to protect your devices on your  home network? (Make sure to discuss how you are going to protect your  network traffic on your wireless network.)
  • Using your book and your responses above, what are the key themes you need to have in a network security policy?

Q8

250-300 words essay: You are the web master of a college website. You share a server with other school departments such as accounting and HR.

Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.

Bitcoin

 While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.  Much of this concern centers around legal protection associated with transactions. Search the Internet and outline what legal protections exist for Bitcoin users in the US and other countries. post should be of 300 words atleast

Building Secure Web Applications

 

1) 

Learning About OWASP

Visit the OWASP website. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP. 

See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

2) 

Do a bit of research on CWE, Common Weakness Enumeration.

Write a brief overview of their scoring system.

Pick one of common weaknesses identified on their site and describe it.

Your assignment should be 200-300 of your own words wth references and citations

2 discussions and 1 case study and weekly Summary

Discussion 2.1

Define and compare Kinetic and non-Kinetic war?  

Discussion 2.2

What laws apply to Cyberwarfare? 

Case Study 2.1

The Intelligence Operations Process.  

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • At least 3-4 peer-reviewed sources that are properly cited and referenced
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Weekly Summary 2.1

Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture.

Writing Requirements

Risk Assessment Executive Summary

 

Compile a 750- to 1,250-word executive summary to be submitted to the executive committee. Within the summary:

  1. Briefly summarize the scope and results of the risk assessment.
  2. Highlight high-risk findings and comment on required management actions.
  3. Present an action plan to address and prioritize compliance gaps.
  4. Present a cost/benefit analysis.
  5. Explain the risks involved in trying to achieve the necessary outcomes and the resources required to address the gaps.

APA style is not required, but solid academic writing is expected.

Refer  to Summary Scoring Guide prior to beginning the assignment to become familiar with the expectations for successful  completion. 

You are required to submit this assignment to TurnItIn. 

What do I Know About Where I Live?

 For this discussion, you are to use the following website: https://www.census.gov/acs/www/data/data-tables-and-tools/data-profiles/2017/ (Links to an external site.)

  • On the landing page, type in the name of your state, and then the name of your city or place.
  • Click on “Get Data Profile”.
  • On the new page, you will see links to 4 sets of information on your area:  
    • Social
    • Education
    • Housing
    • Demographic
  • Choose any two variables you think might be related and find them by  using the links to the related set.  In the tables, locate the  variables you chose to work with. For example, you could use the number  of rooms (in a house) under Housing and household incomes and benefits  under Economy.
  • Find the values for each of your two variables for several years.  For example, you might use the number of rooms and household income for  the years 2012- 2017.
  • Use Excel to make a scatterplot and to find the correlation  coefficient. You should then have 6 points on the scatterplot, one for  each year.

Share your scatterplot and correlation coefficient in your post and use them to address the following in your discussion post:

  • Why did you think a relationship exists between the two variables you chose? 
  • Based on the Excel scatterplot and output 
    • State what type of relationship exists:  Negative, positive, or none. 
    • Describe the relationship in words including what happens to one as  the other changes. For example, as the number of rooms in a house  increases, does the family income increase as well?
  • Does the statistical information you obtained support or refute your alternative hypothesis that a relationship exists? 
    • How?
    • If you did not find a relationship, why do you think that is?
  • What is the value to knowing there is a correlation between the  variables? For example, what businesses might flourish in a wealthy  area?   
  • Would another variable better explain the relationship?  
  • How might the city use such information to make improvements?  For  example, if you found a relationship between crime and poverty would it  make sense to make addressing poverty a priority?
  • Can you conclude that one variable is causing the other? Why or why not?